Privacy-preserving based encryption techniques for securing data in cloud computing environments

Ramesh Bishukarma *

Independent Researcher
 
Review
International Journal of Science and Research Archive, 2023, 09(02), 1014–1025.
Article DOI: 10.30574/ijsra.2023.9.2.0441
Publication history: 
Received on 07 June 2023; revised on 16 August 2023; accepted on 20 August 2023
 
Abstract: 
A successful strategy for comprehensive data processing and storage is cloud computing. Nevertheless, in cloud environments maintaining confidentiality for critical data remains one of the biggest concerns for end-users as well as service providers. Homomorphic encryption has been proved to be one of the efficient techniques to handle the data securely in cloud while keeping the data secret. The importance of privacy preserving encryption in cloud computing environments is discussed in this paper to justify the significance of these protocols within the IT Industry that has evolved through the availability of elastic, on-demand resources. This paper presents an overview of privacy-preserving encryption techniques that enhance data security in cloud computing. We explore various encryption methodologies, including Symmetric, Asymmetric, and homomorphic encryption, as well as Encryption Protocols like SMPC, ZKPs, PRE and Functional Encryption. These protocols ensure data confidentiality and regulatory compliance while addressing the challenges of maintaining data utility and minimising exposure risks. By proposing a comprehensive framework that integrates these techniques, we aim to provide a robust solution for safeguarding data privacy in cloud environments, ultimately fostering trust and confidence in cloud services. However, as cloud adoption continues to grow, optimising these encryption protocols for computational efficiency and adaptability remains essential to achieving seamless, secure cloud operations across industries.
 
Keywords: 
Cloud computing; Data Security; Encryption techniques; Community cloud; Symmetric and Asymmetric Encryption
 
Full text article in PDF: